586cba
From 4dad0e9abbc843fba4e5fee6e7aa1b0db13f5898 Mon Sep 17 00:00:00 2001
586cba
From: =?UTF-8?q?Eugenio=20P=C3=A9rez?= <eperezma@redhat.com>
586cba
Date: Thu, 21 Jul 2022 15:27:35 +0200
586cba
Subject: [PATCH 03/32] hw/virtio: Replace g_memdup() by g_memdup2()
586cba
MIME-Version: 1.0
586cba
Content-Type: text/plain; charset=UTF-8
586cba
Content-Transfer-Encoding: 8bit
586cba
586cba
RH-Author: Eugenio Pérez <eperezma@redhat.com>
586cba
RH-MergeRequest: 108: Net Control Virtqueue shadow Support
586cba
RH-Commit: [3/27] ae196903eb1a7aebbf999100e997cf82e5024cb6 (eperezmartin/qemu-kvm)
586cba
RH-Bugzilla: 1939363
586cba
RH-Acked-by: Stefano Garzarella <sgarzare@redhat.com>
586cba
RH-Acked-by: Cindy Lu <lulu@redhat.com>
586cba
RH-Acked-by: Laurent Vivier <lvivier@redhat.com>
586cba
586cba
Bugzilla: https://bugzilla.redhat.com/1939363
586cba
586cba
Upstream Status: git://git.qemu.org/qemu.git
586cba
586cba
commit d792199de55ca5cb5334016884039c740290b5c7
586cba
Author: Philippe Mathieu-Daudé <f4bug@amsat.org>
586cba
Date:   Thu May 12 19:57:46 2022 +0200
586cba
586cba
    hw/virtio: Replace g_memdup() by g_memdup2()
586cba
586cba
    Per https://discourse.gnome.org/t/port-your-module-from-g-memdup-to-g-memdup2-now/5538
586cba
586cba
      The old API took the size of the memory to duplicate as a guint,
586cba
      whereas most memory functions take memory sizes as a gsize. This
586cba
      made it easy to accidentally pass a gsize to g_memdup(). For large
586cba
      values, that would lead to a silent truncation of the size from 64
586cba
      to 32 bits, and result in a heap area being returned which is
586cba
      significantly smaller than what the caller expects. This can likely
586cba
      be exploited in various modules to cause a heap buffer overflow.
586cba
586cba
    Replace g_memdup() by the safer g_memdup2() wrapper.
586cba
586cba
    Acked-by: Jason Wang <jasowang@redhat.com>
586cba
    Acked-by: Eugenio Pérez <eperezma@redhat.com>
586cba
    Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
586cba
    Message-Id: <20220512175747.142058-6-eperezma@redhat.com>
586cba
    Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
586cba
    Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
586cba
586cba
Signed-off-by: Eugenio Pérez <eperezma@redhat.com>
586cba
---
586cba
 hw/net/virtio-net.c       | 3 ++-
586cba
 hw/virtio/virtio-crypto.c | 6 +++---
586cba
 2 files changed, 5 insertions(+), 4 deletions(-)
586cba
586cba
diff --git a/hw/net/virtio-net.c b/hw/net/virtio-net.c
586cba
index 099e65036d..633de61513 100644
586cba
--- a/hw/net/virtio-net.c
586cba
+++ b/hw/net/virtio-net.c
586cba
@@ -1458,7 +1458,8 @@ static void virtio_net_handle_ctrl(VirtIODevice *vdev, VirtQueue *vq)
586cba
         }
586cba
 
586cba
         iov_cnt = elem->out_num;
586cba
-        iov2 = iov = g_memdup(elem->out_sg, sizeof(struct iovec) * elem->out_num);
586cba
+        iov2 = iov = g_memdup2(elem->out_sg,
586cba
+                               sizeof(struct iovec) * elem->out_num);
586cba
         s = iov_to_buf(iov, iov_cnt, 0, &ctrl, sizeof(ctrl));
586cba
         iov_discard_front(&iov, &iov_cnt, sizeof(ctrl));
586cba
         if (s != sizeof(ctrl)) {
586cba
diff --git a/hw/virtio/virtio-crypto.c b/hw/virtio/virtio-crypto.c
586cba
index dcd80b904d..0e31e3cc04 100644
586cba
--- a/hw/virtio/virtio-crypto.c
586cba
+++ b/hw/virtio/virtio-crypto.c
586cba
@@ -242,7 +242,7 @@ static void virtio_crypto_handle_ctrl(VirtIODevice *vdev, VirtQueue *vq)
586cba
         }
586cba
 
586cba
         out_num = elem->out_num;
586cba
-        out_iov_copy = g_memdup(elem->out_sg, sizeof(out_iov[0]) * out_num);
586cba
+        out_iov_copy = g_memdup2(elem->out_sg, sizeof(out_iov[0]) * out_num);
586cba
         out_iov = out_iov_copy;
586cba
 
586cba
         in_num = elem->in_num;
586cba
@@ -605,11 +605,11 @@ virtio_crypto_handle_request(VirtIOCryptoReq *request)
586cba
     }
586cba
 
586cba
     out_num = elem->out_num;
586cba
-    out_iov_copy = g_memdup(elem->out_sg, sizeof(out_iov[0]) * out_num);
586cba
+    out_iov_copy = g_memdup2(elem->out_sg, sizeof(out_iov[0]) * out_num);
586cba
     out_iov = out_iov_copy;
586cba
 
586cba
     in_num = elem->in_num;
586cba
-    in_iov_copy = g_memdup(elem->in_sg, sizeof(in_iov[0]) * in_num);
586cba
+    in_iov_copy = g_memdup2(elem->in_sg, sizeof(in_iov[0]) * in_num);
586cba
     in_iov = in_iov_copy;
586cba
 
586cba
     if (unlikely(iov_to_buf(out_iov, out_num, 0, &req, sizeof(req))
586cba
-- 
586cba
2.31.1
586cba